diff options
Diffstat (limited to 'cmds/installd/commands.c')
-rw-r--r-- | cmds/installd/commands.c | 563 |
1 files changed, 563 insertions, 0 deletions
diff --git a/cmds/installd/commands.c b/cmds/installd/commands.c new file mode 100644 index 000000000000..ab7d67ac8c86 --- /dev/null +++ b/cmds/installd/commands.c @@ -0,0 +1,563 @@ +/* +** Copyright 2008, The Android Open Source Project +** +** Licensed under the Apache License, Version 2.0 (the "License"); +** you may not use this file except in compliance with the License. +** You may obtain a copy of the License at +** +** http://www.apache.org/licenses/LICENSE-2.0 +** +** Unless required by applicable law or agreed to in writing, software +** distributed under the License is distributed on an "AS IS" BASIS, +** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +** See the License for the specific language governing permissions and +** limitations under the License. +*/ + +#include "installd.h" + +int install(const char *pkgname, uid_t uid, gid_t gid) +{ + char pkgdir[PKG_PATH_MAX]; + char libdir[PKG_PATH_MAX]; + + if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { + LOGE("invalid uid/gid: %d %d\n", uid, gid); + return -1; + + } + if (create_pkg_path(pkgdir, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) + return -1; + if (create_pkg_path(libdir, PKG_LIB_PREFIX, pkgname, PKG_LIB_POSTFIX)) + return -1; + + if (mkdir(pkgdir, 0755) < 0) { + LOGE("cannot create dir '%s': %s\n", pkgdir, strerror(errno)); + return -errno; + } + if (chown(pkgdir, uid, gid) < 0) { + LOGE("cannot chown dir '%s': %s\n", pkgdir, strerror(errno)); + unlink(pkgdir); + return -errno; + } + if (mkdir(libdir, 0755) < 0) { + LOGE("cannot create dir '%s': %s\n", libdir, strerror(errno)); + unlink(pkgdir); + return -errno; + } + if (chown(libdir, AID_SYSTEM, AID_SYSTEM) < 0) { + LOGE("cannot chown dir '%s': %s\n", libdir, strerror(errno)); + unlink(libdir); + unlink(pkgdir); + return -errno; + } + return 0; +} + +int uninstall(const char *pkgname) +{ + char pkgdir[PKG_PATH_MAX]; + + if (create_pkg_path(pkgdir, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) + return -1; + + /* delete contents AND directory, no exceptions */ + return delete_dir_contents(pkgdir, 1, 0); +} + +int delete_user_data(const char *pkgname) +{ + char pkgdir[PKG_PATH_MAX]; + + if (create_pkg_path(pkgdir, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) + return -1; + + /* delete contents, excluding "lib", but not the directory itself */ + return delete_dir_contents(pkgdir, 0, "lib"); +} + +int delete_cache(const char *pkgname) +{ + char cachedir[PKG_PATH_MAX]; + + if (create_pkg_path(cachedir, CACHE_DIR_PREFIX, pkgname, CACHE_DIR_POSTFIX)) + return -1; + + /* delete contents, not the directory, no exceptions */ + return delete_dir_contents(cachedir, 0, 0); +} + + +static int disk_free(void) +{ + struct statfs sfs; + if (statfs(PKG_DIR_PREFIX, &sfs) == 0) { + return sfs.f_bavail * sfs.f_bsize; + } else { + return -1; + } +} + + +/* Try to ensure free_size bytes of storage are available. + * Returns 0 on success. + * This is rather simple-minded because doing a full LRU would + * be potentially memory-intensive, and without atime it would + * also require that apps constantly modify file metadata even + * when just reading from the cache, which is pretty awful. + */ +int free_cache(int free_size) +{ + const char *name; + int dfd, subfd; + DIR *d; + struct dirent *de; + int avail; + + avail = disk_free(); + if (avail < 0) return -1; + + LOGI("free_cache(%d) avail %d\n", free_size, avail); + if (avail > free_size) return 0; + + d = opendir(PKG_DIR_PREFIX); + if (d == NULL) { + LOGE("cannot open %s\n", PKG_DIR_PREFIX); + return 0; + } + dfd = dirfd(d); + + while ((de = readdir(d))) { + if (de->d_type != DT_DIR) continue; + name = de->d_name; + + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd < 0) continue; + + delete_dir_contents_fd(subfd, "cache"); + close(subfd); + + avail = disk_free(); + if (avail > free_size) { + closedir(d); + return 0; + } + } + closedir(d); + return -1; +} + + +/* used by move_dex, rm_dex, etc to ensure that the provided paths + * don't point anywhere other than at the APK_DIR_PREFIX + */ +static int is_valid_apk_path(const char *path) +{ + int len = strlen(APK_DIR_PREFIX); + if (strncmp(path, APK_DIR_PREFIX, len)) { + len = strlen(PROTECTED_DIR_PREFIX); + if (strncmp(path, PROTECTED_DIR_PREFIX, len)) { + LOGE("invalid apk path '%s' (bad prefix)\n", path); + return 0; + } + } + if (strchr(path + len, '/')) { + LOGE("invalid apk path '%s' (subdir?)\n", path); + return 0; + } + if (path[len] == '.') { + LOGE("invalid apk path '%s' (trickery)\n", path); + return 0; + } + return 1; +} + +int move_dex(const char *src, const char *dst) +{ + char src_dex[PKG_PATH_MAX]; + char dst_dex[PKG_PATH_MAX]; + + if (!is_valid_apk_path(src)) return -1; + if (!is_valid_apk_path(dst)) return -1; + + if (create_cache_path(src_dex, src)) return -1; + if (create_cache_path(dst_dex, dst)) return -1; + + LOGI("move %s -> %s\n", src_dex, dst_dex); + if (rename(src_dex, dst_dex) < 0) { + return -1; + } else { + return 0; + } +} + +int rm_dex(const char *path) +{ + char dex_path[PKG_PATH_MAX]; + + if (!is_valid_apk_path(path)) return -1; + if (create_cache_path(dex_path, path)) return -1; + + LOGI("unlink %s\n", dex_path); + if (unlink(dex_path) < 0) { + return -1; + } else { + return 0; + } +} + +int protect(char *pkgname, gid_t gid) +{ + struct stat s; + char pkgpath[PKG_PATH_MAX]; + + if (gid < AID_SYSTEM) return -1; + + if (create_pkg_path(pkgpath, PROTECTED_DIR_PREFIX, pkgname, ".apk")) + return -1; + + if (stat(pkgpath, &s) < 0) return -1; + + if (chown(pkgpath, s.st_uid, gid) < 0) { + LOGE("failed to chgrp '%s': %s\n", pkgpath, strerror(errno)); + return -1; + } + + if (chmod(pkgpath, S_IRUSR|S_IWUSR|S_IRGRP) < 0) { + LOGE("failed to chmod '%s': %s\n", pkgpath, strerror(errno)); + return -1; + } + + return 0; +} + +static int stat_size(struct stat *s) +{ + int blksize = s->st_blksize; + int size = s->st_size; + + if (blksize) { + /* round up to filesystem block size */ + size = (size + blksize - 1) & (~(blksize - 1)); + } + + return size; +} + +static int calculate_dir_size(int dfd) +{ + int size = 0; + struct stat s; + DIR *d; + struct dirent *de; + + d = fdopendir(dfd); + if (d == NULL) { + close(dfd); + return 0; + } + + while ((de = readdir(d))) { + const char *name = de->d_name; + if (de->d_type == DT_DIR) { + int subfd; + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd >= 0) { + size += calculate_dir_size(subfd); + } + } else { + if (fstatat(dfd, name, &s, AT_SYMLINK_NOFOLLOW) == 0) { + size += stat_size(&s); + } + } + } + closedir(d); + return size; +} + +int get_size(const char *pkgname, const char *apkpath, + const char *fwdlock_apkpath, + int *_codesize, int *_datasize, int *_cachesize) +{ + DIR *d; + int dfd; + struct dirent *de; + struct stat s; + char path[PKG_PATH_MAX]; + + int codesize = 0; + int datasize = 0; + int cachesize = 0; + + /* count the source apk as code -- but only if it's not + * on the /system partition + */ + if (strncmp(apkpath, "/system", 7) != 0) { + if (stat(apkpath, &s) == 0) { + codesize += stat_size(&s); + } + } + /* count the forward locked apk as code if it is given + */ + if (fwdlock_apkpath != NULL && fwdlock_apkpath[0] != '!') { + if (stat(fwdlock_apkpath, &s) == 0) { + codesize += stat_size(&s); + } + } + + + /* count the cached dexfile as code */ + if (!create_cache_path(path, apkpath)) { + if (stat(path, &s) == 0) { + codesize += stat_size(&s); + } + } + + if (create_pkg_path(path, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) { + goto done; + } + + d = opendir(path); + if (d == NULL) { + goto done; + } + dfd = dirfd(d); + + /* most stuff in the pkgdir is data, except for the "cache" + * directory and below, which is cache, and the "lib" directory + * and below, which is code... + */ + while ((de = readdir(d))) { + const char *name = de->d_name; + + if (de->d_type == DT_DIR) { + int subfd; + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd >= 0) { + int size = calculate_dir_size(subfd); + if (!strcmp(name,"lib")) { + codesize += size; + } else if(!strcmp(name,"cache")) { + cachesize += size; + } else { + datasize += size; + } + } + } else { + if (fstatat(dfd, name, &s, AT_SYMLINK_NOFOLLOW) == 0) { + datasize += stat_size(&s); + } + } + } + closedir(d); +done: + *_codesize = codesize; + *_datasize = datasize; + *_cachesize = cachesize; + return 0; +} + + +/* a simpler version of dexOptGenerateCacheFileName() */ +int create_cache_path(char path[PKG_PATH_MAX], const char *src) +{ + char *tmp; + int srclen; + int dstlen; + + srclen = strlen(src); + + /* demand that we are an absolute path */ + if ((src == 0) || (src[0] != '/') || strstr(src,"..")) { + return -1; + } + + if (srclen > PKG_PATH_MAX) { // XXX: PKG_NAME_MAX? + return -1; + } + + dstlen = srclen + strlen(DALVIK_CACHE_PREFIX) + + strlen(DALVIK_CACHE_POSTFIX) + 1; + + if (dstlen > PKG_PATH_MAX) { + return -1; + } + + sprintf(path,"%s%s%s", + DALVIK_CACHE_PREFIX, + src + 1, /* skip the leading / */ + DALVIK_CACHE_POSTFIX); + + for(tmp = path + strlen(DALVIK_CACHE_PREFIX); *tmp; tmp++) { + if (*tmp == '/') { + *tmp = '@'; + } + } + + return 0; +} + +static void run_dexopt(int zip_fd, int odex_fd, const char* input_file_name) +{ + static const char* DEX_OPT_BIN = "/system/bin/dexopt"; + static const int MAX_INT_LEN = 12; // '-'+10dig+'\0' -OR- 0x+8dig + char zip_num[MAX_INT_LEN]; + char odex_num[MAX_INT_LEN]; + + sprintf(zip_num, "%d", zip_fd); + sprintf(odex_num, "%d", odex_fd); + + execl(DEX_OPT_BIN, DEX_OPT_BIN, "--zip", zip_num, odex_num, input_file_name, + (char*) NULL); + LOGE("execl(%s) failed: %s\n", DEX_OPT_BIN, strerror(errno)); +} + +static int wait_dexopt(pid_t pid, const char* apk_path) +{ + int status; + pid_t got_pid; + + /* + * Wait for the optimization process to finish. + */ + while (1) { + got_pid = waitpid(pid, &status, 0); + if (got_pid == -1 && errno == EINTR) { + printf("waitpid interrupted, retrying\n"); + } else { + break; + } + } + if (got_pid != pid) { + LOGW("waitpid failed: wanted %d, got %d: %s\n", + (int) pid, (int) got_pid, strerror(errno)); + return 1; + } + + if (WIFEXITED(status) && WEXITSTATUS(status) == 0) { + LOGD("DexInv: --- END '%s' (success) ---\n", apk_path); + return 0; + } else { + LOGW("DexInv: --- END '%s' --- status=0x%04x, process failed\n", + apk_path, status); + return status; /* always nonzero */ + } +} + +int dexopt(const char *apk_path, uid_t uid, int is_public) +{ + struct utimbuf ut; + struct stat apk_stat, dex_stat; + char dex_path[PKG_PATH_MAX]; + char *end; + int res, zip_fd=-1, odex_fd=-1; + + /* Before anything else: is there a .odex file? If so, we have + * pre-optimized the apk and there is nothing to do here. + */ + if (strlen(apk_path) >= (PKG_PATH_MAX - 8)) { + return -1; + } + + strcpy(dex_path, apk_path); + end = strrchr(dex_path, '.'); + if (end != NULL) { + strcpy(end, ".odex"); + if (stat(dex_path, &dex_stat) == 0) { + return 0; + } + } + + if (create_cache_path(dex_path, apk_path)) { + return -1; + } + + memset(&apk_stat, 0, sizeof(apk_stat)); + stat(apk_path, &apk_stat); + + zip_fd = open(apk_path, O_RDONLY, 0); + if (zip_fd < 0) { + LOGE("dexopt cannot open '%s' for input\n", apk_path); + return -1; + } + + unlink(dex_path); + odex_fd = open(dex_path, O_RDWR | O_CREAT | O_EXCL, 0644); + if (odex_fd < 0) { + LOGE("dexopt cannot open '%s' for output\n", dex_path); + goto fail; + } + if (fchown(odex_fd, AID_SYSTEM, uid) < 0) { + LOGE("dexopt cannot chown '%s'\n", dex_path); + goto fail; + } + if (fchmod(odex_fd, + S_IRUSR|S_IWUSR|S_IRGRP | + (is_public ? S_IROTH : 0)) < 0) { + LOGE("dexopt cannot chmod '%s'\n", dex_path); + goto fail; + } + + LOGD("DexInv: --- BEGIN '%s' ---\n", apk_path); + + pid_t pid; + pid = fork(); + if (pid == 0) { + /* child -- drop privileges before continuing */ + if (setgid(uid) != 0) { + LOGE("setgid(%d) failed during dexopt\n", uid); + exit(64); + } + if (setuid(uid) != 0) { + LOGE("setuid(%d) during dexopt\n", uid); + exit(65); + } + if (flock(odex_fd, LOCK_EX | LOCK_NB) != 0) { + LOGE("flock(%s) failed: %s\n", dex_path, strerror(errno)); + exit(66); + } + + run_dexopt(zip_fd, odex_fd, apk_path); /* does not return */ + exit(67); + } else { + res = wait_dexopt(pid, apk_path); + if (res != 0) { + LOGE("dexopt failed on '%s' res = %d\n", dex_path, res); + goto fail; + } + } + + ut.actime = apk_stat.st_atime; + ut.modtime = apk_stat.st_mtime; + utime(dex_path, &ut); + + close(odex_fd); + close(zip_fd); + return 0; + +fail: + if (odex_fd >= 0) { + close(odex_fd); + unlink(dex_path); + } + if (zip_fd >= 0) { + close(zip_fd); + } + return -1; +} |